Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reboot/fix/OIDC auth introspect #3183

Merged
merged 12 commits into from
Oct 24, 2023

Conversation

Shobhajayanna
Copy link
Contributor

Your checklist for this pull request

🚨Please review the guidelines for contributing to this repository.

  • If the changes in this PR is part of the next future release, make this pull request against the docs-staging branch which will be published at the next release boundary. If the changes in this PR are part of the current release, use the default base branch, master. For more information about branches, see https://github.com/zowe/docs-site/tree/master#understanding-the-doc-branches.

  • If this PR relates to GitHub issues in docs-site or other repositories, please list in Description, prefixed with close, fix or resolve keywords.

This PR is to update the OIDC documents with mechanism and new properties in OIDC to configure JWK keys location (obtained according to documentation from the authorization server's metadata)

New properties:

apiml.security.oidc.jwks.uri: URL to the JWK keys endpoint.
apiml.security.oidc.jwks.refreshInternalHours: hours to refresh the JWK keys.

❤️Thank you!

Pablo Hernán Carle and others added 3 commits October 12, 2023 10:38
Signed-off-by: Pablo Hernán Carle <[email protected]>
wip
Signed-off-by: Pablo Hernán Carle <[email protected]>
@github-actions
Copy link

github-actions bot commented Oct 19, 2023

@github-actions github-actions bot temporarily deployed to pull request October 19, 2023 19:52 Inactive
@github-actions github-actions bot temporarily deployed to pull request October 19, 2023 20:50 Inactive
@@ -112,35 +127,6 @@ Use the following procedure to enable the feature to use an OIDC Access Token as

## Troubleshooting
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we can refactor the current ones and mention that failure can occur if:

  • JWK is not available or incorrectly configured.
  • JWK was revoked by the authorization server and the update has not happened yet in the api ml (in this case configure better value for the refresh interval or restart api ml, or just wait)

@github-actions github-actions bot temporarily deployed to pull request October 20, 2023 15:16 Inactive
@github-actions github-actions bot temporarily deployed to pull request October 23, 2023 08:49 Inactive
@github-actions github-actions bot temporarily deployed to pull request October 24, 2023 10:07 Inactive
- After successful validation of all authentication factors, the OIDC provider grants the client an Access Token.
- The client can then request from API ML Gateway the needed mainframe resources presenting the access token in the request.

- The Gateway validates the access token.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this statement necessary? The next statement repeats this with additional information...


- The Gateway validates the access token.

- The Gateway validates the access token by comparing the key id of the token against the key ids obtained from the authorization server's JWK keys endpoint,URL to end point should be set using the property jwks_uri. If the access token is validated, the outcome is cached for a short time (20 sec by default).
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Review this sentence. I suggest this be two sentences.
"the key ids obtained from the authorization server's JWK keys endpoint,URL to end point should be set"


- The Gateway validates the access token by comparing the key id of the token against the key ids obtained from the authorization server's JWK keys endpoint,URL to end point should be set using the property jwks_uri. If the access token is validated, the outcome is cached for a short time (20 sec by default).

- The JWK Keys obtained from the authorization server's endpoint are cached for a while to prevent the repeated calls to the endpoint. It can be set using the property jwks.refreshInternalHours (it's 1 hour by default)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please make "for a while" more specific. Perhaps, " The JWK Keys obtained from the authorization server's endpoint can be cached for a specified interval to prevent the repeated calls to the endpoint."

janan07 and others added 2 commits October 24, 2023 14:06
Signed-off-by: Andrew Jandacek <[email protected]>
Signed-off-by: sj895092 <[email protected]>
@github-actions github-actions bot temporarily deployed to pull request October 24, 2023 12:57 Inactive
@github-actions github-actions bot temporarily deployed to pull request October 24, 2023 14:10 Inactive
Copy link
Collaborator

@janan07 janan07 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewed by the doc squad

@Shobhajayanna Shobhajayanna merged commit 345de94 into docs-staging Oct 24, 2023
@Shobhajayanna Shobhajayanna deleted the reboot/fix/oidc-auth-introspect branch October 24, 2023 16:47
@github-actions github-actions bot temporarily deployed to pull request October 24, 2023 17:20 Inactive
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants